Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
dbff989c6570bf624472adf614fb973e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbff989c6570bf624472adf614fb973e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbff989c6570bf624472adf614fb973e_JaffaCakes118.html
-
Size
40KB
-
MD5
dbff989c6570bf624472adf614fb973e
-
SHA1
1c7a1af2b745493309e29a8ae2466264206fcc1b
-
SHA256
042a21c0d191bfc8c4f56e74740e57e4eb8c65f7fb882874fa37d36c8898fece
-
SHA512
f6da06979d869b6374e64e8340716a86832f66c85c316fee7b4fa3c07c999ce05b861c99ffa3b1c7edb2a0bf253f4bcc36bb80fed3ebfa3f69cad52fed38496a
-
SSDEEP
768:7pROQzeTVRP2BpBL0kTcskerrUJLDKp5ZCH1CNszfsrcwfCYj5RjrKZKIWa7UlIO:tR36ApBzTcskeIqfQY0Ug6x5AKItUlIO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 4420 msedge.exe 4420 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1088 4420 msedge.exe 83 PID 4420 wrote to memory of 1088 4420 msedge.exe 83 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 4644 4420 msedge.exe 84 PID 4420 wrote to memory of 1232 4420 msedge.exe 85 PID 4420 wrote to memory of 1232 4420 msedge.exe 85 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86 PID 4420 wrote to memory of 4632 4420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbff989c6570bf624472adf614fb973e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16638260082998311507,13588526741574277741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD570ed066b04a8ed31bde6f1cd9f1dbed0
SHA15e07f8eaab6d58ab45207c586bf3e989ea276df1
SHA256f4e472853566015e0ce64cbd182bb4390e0944e331378176e7633f8bce1d7aea
SHA51234ea44160917fb4bf3697cf05934c346fdef7bbf732c2884ca41432a36f2be876e9e9abc6c7124d177fb8b81d00e2b4b8794ce036a95432e36312f6d3cc355b6
-
Filesize
1KB
MD5651d9a47396aea831039f0e71fd2bf09
SHA155e0105f5d581b57a4059f718674f6510c9e10bf
SHA25678533f6ec8137ed5a9a35311ad411f2ea5dc4ea45ceb489535e06687acef77f2
SHA5126727059ddec9ba57d91cb94f527fbebd9a63e5de66a75e6b37aa99c68a21731b99f9a1fda5106998aff8eea1d400ea45af9841c7b136da2b490e7bcdd2894aea
-
Filesize
5KB
MD564e1e50279e0d835ec1246ae7ba0c038
SHA105857b5fc266195b91153d11b0830fe5249dd833
SHA2561c489b7651f24c7d796342b8440c975569b33d1837ed094696300fba7b4023f5
SHA512236b0c242ce9007924fad0fa0d2b0630c33f78202c06455ca8e974922b37cdf35864b06d77c79943960de91ef73c6bdb57818b0f1a2b200dd047497a2ab744b9
-
Filesize
6KB
MD5221e67b40af2b04364e27864f39814fe
SHA1b532f163674c8c828ae1c985150978d07762ed80
SHA2561b940ea89f737ec8db2af905abc801e09d42eb89d41565723578567f99dbf803
SHA5120483b82364cfcaacdfe5074a920b6213987b2ad4afc729b10af37ad168bcc699dba52df51e24acfea7a9ed79d3ee7ec553d3d454606c4ac00a4a1a3879ac590e
-
Filesize
6KB
MD53c9e3bf6ad9325f2e24ae2c6b586202a
SHA14068fc80425d38a25e1d97842d875d687016135a
SHA2563a2bfbfc6fc1178d94839aa48fe998bd56f5ee7ab6198d54ea367df8e1f96ea3
SHA512ed162f5ab7520f47c83c01d339cd2771ef6d12f2827551b52709a7a1c9742ad32423dd6706c9fe5a897e55da73f03152dab8b9096551d99b961c87e0f4ee4586
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f631bce62be03a01f91a69e0d05b5a8e
SHA170c4553fa27518844c89bf8840e99c4eddf86229
SHA25619b1c7185e835e2c7453cb2a1d979bcc3f6b9a8b4176f5262548568c42f6aa6b
SHA51268a5b4d0e53a621a4cb0284bd242cb266b6e76bd67bc5bf512e7fea40cac9537ec11904d9f20594199960bf5bb3c8292015e7044fc3772e87c6c6ca6784dd594